April 3, 2026

Hunting Supply Chain Compromises LiteLLM & Axios

Supply chain attacks are not new. What is new is the pace and the precision. In the recent Axios and TeamPCP campaigns, we have different actors, different tooling, but the same fundamental constraint: both must install through package managers, execute outside the language runtime, access credentials, persist, and communicate externally. Each step leaves a behavioral trace that outlasts any IOC list.

Read More
February 18, 2026

Hunting the Notepad++ Update Hijack

Software supply chain attacks have shifted from occasional, high-profile incidents into a repeatable and increasingly preferred intrusion technique and the Notepad++ incident is the latest evolution. This gives hunters a case for looking at deviations from behavioral baselines.

Read More
February 9, 2026

Nebulog: What's New in Nebulock

The latest Nebulock product updates: Insights, integrations, additional detection, SOC 2 Type 2, and more.

Read More

Find hidden threats between the layers

Beacuse breaches happen in silence

Get a Demo